A field experiment was conducted during the autumn of 2021 at the Agricultural Research Department station / Abu Ghraib to evaluate the soil moisture, water potential distribution, and growth factors of maize crops under alternating and constant partial drip irrigation methods. In the experiment, two irrigation systems were used, surface drip irrigation (DI) and subsurface irrigation (SD); under each irrigation system, five irrigation methods were: conventional irrigation (CI), and 75 and 50% of the amount of water of CI of each of the alternating partial irrigation APRI75 and APRI50 and the constant partial irrigation FPRI75 and FPRI50 respectively. The results showed that the water depth for conventional irrigation (C1) was 658.3 and 579.4 mm for the DI and SD irrigation systems, respectively, and the irrigation depth was reduced to 18% when applied APRI75 and FPRI75 and 37% when applied APRI50 and FPRI50 respectively. The moisture distribution differed according to the irrigation method, and the SD provided a higher moisture content and lower water potential due to the lower evaporation rate from the soil surface. Also, the growth traits of maize varied according to the irrigation system and its methods. The SD system was significantly superior in the grain yield of maize with an increase of 5.4% compared with DI, and the alternating partial irrigation treatments were significantly superior to the constant partial irrigation. Keywords: Matric suction, Zea mays L., irrigation system, irrigation depth.
Background: Oxidative stress may contribute to the etiology of hypertension in humans. Oxidative stress is an imbalance between reactive oxygen species (ROS) and antioxidant defense mechanisms, causing damage to biological macromolecules and dysregulation of normal metabolism and physiology. Amlodipine as an antihypertensive agent is a long-acting calcium channel blocker that dilates blood vessels and improves blood flow. The aim of this study was to assess the oxidative stress in hypertensive patients on Amlodipine treatment through the assessment of salivary Malondialdehyde (MDA) and superoxide dismutase (SOD) as a marker of oxidative stress.
Mat
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreIn this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreIn this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
The image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o
... Show MoreHand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover
... Show More